BCA / B.Tech 7 min read

Token Ring

Token Ring in Computer Networks:


Token Ring is a networking technology developed by IBM in the 1980s. This technology is specifically used in Local Area Networks (LAN). Token Ring was designed to streamline data transfer in networking and works on a ring structure.

Introduction to Token Ring:
Token Ring is a local area network where all devices are connected in a ring. This technology uses a special data packet called a "token." The token allows for the transfer of data on the network. When a device needs to send data, it must first obtain the token.

Working of Token Ring:
The process involves a token circulating the ring. A device wanting to send data captures the token, attaches its data packet, and sends it along the ring. The destination device reads the data and sends the token back onto the network for others to use.

Advantages and Disadvantages of Token Ring:
Advantages: Organized traffic (collision-free), predictable timing, and regular performance.
Disadvantages: Complex setup, susceptibility to failure (if one part of the ring fails), and lower speed compared to other technologies.

Current Status:
Although Token Ring gained popularity in the 1980s and 1990s, this technology is less used today, replaced by Ethernet, Wi-Fi, and other advanced networking technologies.

In this Chapter

Token Ring
Auto-Configuration and Anycast
Modified EUI-64 | What is Modified EUI-64?
Architecture of Mobile Computing
Wireless LAN in Hindi | What is Wireless LAN?
Wireless User Devices
MAC Protocol | What is MAC Protocol?
IEEE 802.11 | What is IEEE 802.11
Mobile IP | What is Mobile IP
Wireless TCP/IP
Unicast & Multicast Communication
Bluetooth | What is Bluetooth?
NS2 & NAM | What are NS2 and NAM?
Purpose & installation of NS2 & NAM
Background of NS2 & NAM
Architecture of NS2 & NAM
Interface of OTcl & C++
Trace Files & Formats
Protocol Support of NS2
Simulation Object of NS2 & NAM
Basic Syntax of NS2 & NAM
Node Creation of NS2 & NAM
Running NS2 & NAM
Finish Procedure NS2 & NAM
Invoking external commands within NS2
Nodes & Agents of NS2 & NAM
NS2 Commands
Creating Links in Wired Network
Setting Link Parameters
Sending Traffics Through NS2 Links
Routing Protocol Support of NS2
Scenarios in Wired Networks
Additional Parameters
Setting node positions
God object & topography
Protocol Support
Scenarios in Wireless Networks
What is the Internet? Difference Between Intranet and Extranet
Types of Internet
OSI Model and its Layers
Computer Network (CN) All Important Questions and Answers in English (MDSU)
BCA | Computer Network | 2025 Paper | MDSU Exam Paper
Importance of the Layer Model in Computer Networks
Network Classification
Network Topology
Network Switching & Components
Ethernet
Basic Networking Concepts & Cabling
What is a Computer in English?
Bridges in Computer Networks
Routers in Computer Networks
Gateways in Computer Networks
Public & Private Networks
FDMA (Frequency Division Multiple Access)
BCA | CN(Computer Network) Paper | 2023 MDSU Exam Paper
What is World Wide Web (WWW)
TDMA, SDMA, CDMA
Personal Communication System | What is PCS
IPv4 | What is IPv4?
Subnetting IPv4 Address
Casting in IPv4
Private IPv4 Addressing
IPv4 Address Scheme
IPv6 Addressing Scheme
Types of IPv6 Addressing